ZeroMemoryEx / Wizard-Loader
Abuse Xwizard.exe for DLL Side-Loading
☆83Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Wizard-Loader
- Load static-compiled PE from remote server.☆58Updated 2 years ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader☆84Updated 8 months ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆113Updated last year
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Updated 2 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆55Updated last year
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆165Updated last year
- Shellcode obfuscation tool to avoid AV/EDR.☆108Updated last year
- Execute a payload at each right click on a file/folder in the explorer menu for persistence☆165Updated last year
- abusing Process Hacker driver to terminate other processes (BYOVD)☆79Updated last year
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆61Updated 2 years ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆53Updated 6 months ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆67Updated 9 months ago
- bring your own vulnerable driver☆81Updated last year
- User Mode Windows Rootkit☆54Updated 10 months ago
- A simple Sleepmask BOF example☆53Updated 2 months ago
- A basic C2 framework written in C☆58Updated 4 months ago
- Generic PE loader for fast prototyping evasion techniques☆185Updated 4 months ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆135Updated 2 years ago
- An implementation of an indirect system call☆116Updated last year
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆41Updated 8 months ago
- It stinks☆100Updated 2 years ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆40Updated 7 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆95Updated last year
- ☆35Updated last year
- Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution☆164Updated 8 months ago
- Exploitation of echo_driver.sys☆167Updated last year